Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Designing tweakable enciphering schemes using public permutations., , and . Adv. Math. Commun., 17 (4): 771-798 (2023)On the security of TrCBC., and . Inf. Process. Lett., (2023)Another Look at XCB., , and . IACR Cryptology ePrint Archive, (2013)Objective reduction using a feature selection technique., , and . GECCO, page 673-680. ACM, (2008)An Improved Security Bound for HCTR., and . FSE, volume 5086 of Lecture Notes in Computer Science, page 289-302. Springer, (2008)Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware., , and . INDOCRYPT, volume 4859 of Lecture Notes in Computer Science, page 414-424. Springer, (2007)HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach., and . INDOCRYPT, volume 4329 of Lecture Notes in Computer Science, page 287-302. Springer, (2006)A Cryptographic Study of Tokenization Systems., , and . SECRYPT, page 393-398. SciTePress, (2014)$FAST$: Disk encryption and beyond., , , and . Adv. Math. Commun., 16 (1): 185-230 (2022)Reconfigurable Hardware Implementations of Tweakable Enciphering Schemes., , and . IEEE Trans. Computers, 59 (11): 1547-1561 (2010)